A model for revocation forecasting in public key infrastructures

Size: px
Start display at page:

Download "A model for revocation forecasting in public key infrastructures"

Transcription

1 A model for revocation forecasting in public key infrastructures Carlos Gañán Jose L. Munoz Oscar Esparza Jorge Mata-Díaz Juanjo Alins Universitat Politècnica de Catalunya (UPC) Abstract One of the hardest tasks of a certification infrastructure is to manage revocation. This process consists in collecting and making the revocation status of certificates available to users. Research on this topic has focused on the trade-offs that different revocation mechanisms offer. Much less effort has been conducted to understand and model real-world revocation processes. For this reason, in this paper, we present a novel analysis of realworld collected revocation data and we propose a revocation prediction model. The model uses an Autoregressive Integrated Moving Average Model (ARIMA). Our prediction model enables certification authorities to forecast the percentage of revoked certificates. Index Terms Certification, PKI, Revocation, CRL, ARIMA. I. INTRODUCTION In a Public Key Infrastructure (PKI), digital certificates are the means of accurately and reliably distributing public keys to users needing to encrypt messages or verify digital signatures. Certificates are signed by certification authorities (CAs) and they are issued with a planned lifetime, which is defined through a validity start time and an explicit expiration date. Once issued, a certificate becomes valid when its validity start time is reached, and it is considered valid until its expiration date. However, various circumstances may cause a certificate to become invalid prior to the expiration of the validity period. Such circumstances include requiring to change the name of the subject of a certificate, the compromise or suspected compromise of the private key associated to the certificate and a change of association between subject and CA, for example, when an employee terminates employment with an organization. Thus, the PKI has to collect and distribute information about revoked certificates. There are several mechanisms to manage revocation information. Currently deployed PKIs rely mostly on Certificate Revocation Lists (CRLs) for handling certificate revocation []. A CRL is a list identifying revoked certificates, which is signed by a CA and made available at a public distribution point. The CRL has a validity period, and updated versions of the CRL are published before the previous CRL s validity period expires. Each revoked certificate is identified in a CRL by its certificate serial number. Typically, CAs automatically issue new CRLs on a regular periodic basis (for example, daily, weekly or monthly). Although CRL is the most widely used mechanism to distribute certificate status information, there have been proposed other mechanisms to make revocation distribution more efficient (see Section II-A for further details). The work presented in this paper is motivated by the fact that despite there are many works in the literature that propose and evaluate different mechanisms for distributing revocation data like [2], [3], [4], [5], [6], [7], little work has been done for analyzing the revocation process itself. For instance, many of the previous studies consider very simplistic assumptions about the revocation process like that the percentage of revoked certificates remains always constant. Only recently, we can find works like [8], [9], [] that carry out statistical studies about the revocation process using data available from real CAs. These studies can be considered a first step towards understanding the revocation process. However, they essentially just analyze the probability distribution of the revocation process. In this paper, we go a step further and we use time-series analysis to build a model and a predictor for revocation. Using this novel way of exploring the revocation data we are able to obtain a model that predicts extremely well the weekly revocation percentage. To build the model, we start performing a preliminary analysis using revocation codes. Revocation codes are optional parameters that can be included within revocation data. When we tried to get some insights about the revocation process using revocation codes, we found that each CA uses the parameter applying different criteria. This is mainly because the use of revocation codes is poorly specified by standardization organisms. So, we cannot use the revocation code as a parameter upon which to build our model. Thus, we build a revocation model which is exclusively based on temporal information, namely revocation dates and the life-time of certificates. These parameters are well-defined and compulsory. Using this information and the Box-Jenkins methodology [], we are able to build a model and a predictor for revocation. More precisely, we are able to show that an ARIMA (Autoregressive, Integrated, Moving Average) model provides objective and accurate predictions of the incremental percentage of weekly revoked certificates. To find the number of significant coefficients and their corresponding values we used Z-transforms and a vision of the problem based on digital filters. This greatly simplified the overall process of finding the model. The resulting model exploits autocorrelations, captures the dependencies within the revocation data and simplifies these complex relationships to linear dependencies. Regarding the data used to build the model, we have to mention that VeriSign is the only CA that makes the lifetime of certificates public. Since this parameter is necessary to build the model, our ARIMA model is based only on

2 2 data provided by VeriSign. Although the collected revocation data only belong to the leading certification authority, the model is expected to be valid for other certification providers because of the huge amount of certificates analyzed and because our model captures the general pattern of the temporal correlation that exists among the revocation events. This pattern is expected to be the same for other CAs because the theoretical reasons to revoke certificates (and therefore the temporal correlation) do not essentially differ, no matter which certificate provider you use. As a final remark, we would like to mention that our model might be interesting for several reasons: on one hand, it provides some insights about the revocation process, like showing that the process is highly autocorrelated and, on the other hand, it allows CAs to make predictions about certificate revocation. This might be useful in some real scenarios (see Section VII). The rest of this paper is organized as follows. Section II briefly reviews the required background. Section III presents a preliminary analysis focused on the study of the revocation causes. In Section IV, we discuss the methodology we used to collect and analyze the revocation data. In Section V, we identify the best ARIMA model that fits the revocation events. Next, in section VI we present the predictor from the previous ARIMA model. In Section VII we discuss some possible practical applications of the revocation forecasting model. Finally, we conclude in Section VIII. II. BACKGROUND A. Certificate Status Validation Mechanisms In this section we briefly review the main approaches to convey Certificate Status Information (CSI). The traditional approach is to periodically publish a certificate revocation list (CRL) [3], which is a list of all revoked certificates within a domain. This list is signed by the CA itself, in order to let end entities verify its authenticity. The main problem with this approach is that the list can grow for large domains, and the network load involved in all clients downloading the list can become unacceptable. To minimize the network resources needed to communicate them to the end entities, CRLs are published frequently and timely when new revocations occur. However, clients tend to download CRLs according to the time established for an update. Therefore, end entities do not possess fresh revocation information on a need-to-know basis. Two solutions were proposed to deal with the CRLs problems [4]: Distribution Points and Delta-CRLs. Distribution Points provide the means to partition a CRL. Delta-CRLs are there to face the problem of using up too much of the available network resources when communicating the CRL either as a whole, or even in parts through Distribution Points. Delta- CRLs provide the means for constructing incremental CRLs. Whenever new revocations have taken place, the (new) CRL that end entities will have to retrieve, will contain only the new CSI. Also to deal with the communication overhead of the CRLs, Micali [5] proposed the Certificate Revocation Status VeriSign represents around half of the market according to [2]. (CRS). In CRS, a CA signs a fresh list of all not-yet-expired certificates together with selected hash chain values. The hash chain values can be used to verify whether the queried certificate is valid or not for a certain time interval. The main advantage of this mechanism is that it significantly reduces the communication costs between the CSI repository and the dependent entity, by employing a mechanism for the CSI dissemination which contains positive statements regarding the status of a certificate. Nevertheless, the main disadvantage of this system is the increase of the CA s communication cost with the CSI repositories [6]. A different, also standardized approach is to provide an online server and use protocols for obtaining on-line revocation information. In this case, a client issues a request for every encountered certificate instead of obtaining a full revocation list. Hence, the online certificate status protocol (OCSP) [7] allows end entities to query for CSI in a more timely fashion than CRLs. OCSP can be used to provide timely CSI, and it could be used in conjunction with CRLs. The responses to CSI queries returned by OCSP are digitally signed. The authority that runs the OCSP service can either be the CA itself, or another entity designated by the CA as a CSI provider (Trusted Responder or CA Designated Responder). The CSI responses given by the authorities are always signed to let requesters verify the authenticity of the CSI. However, the signing of each OCSP response is a computational overhead and it could facilitate Denial of Service (DoS) attacks. Pre-computed responses that have a short validity interval could be a solution to this problem. These pre-signed OCSP responses are usually provided via SSL/TLS authenticated channels. However, in case the transport protocol is not authenticated, the authority that provides the OCSP service is vulnerable against replay attacks, where someone could replay OCSP responses before their expiration date but after a certificate has been revoked. Kocher [8] suggested another CSI mechanism, the Certificate Revocation Tree (CRT). A CRT is based on a Merkle hash tree [9] containing certificate serial number ranges as the tree leaves. The root of the hash tree is signed by the CA. Now, the certificate status proof for a certificate with serial number s consists of the path node siblings from the root to the appropriate leaf (having s in its range), in addition to the signature on the root of the tree. Thus, If n certificates are currently revoked, the length of the proof is O(log n). In contrast, the length of the validity proof in OCSP is O(). B. Autoregressive Integrated Moving Average (ARIMA) Processes Prediction of scalar time series refers to the task of finding estimate of next future sample ŝ(n) based on the knowledge of the history of time series, i.e. samples s(n ), s(n 2), etc. Many time series can be suitably forecast using linear techniques as the Auto Regressive Integrated Moving Average (ARIMA) model popularized by Box and Jenkins []. In this paper we show that the revocation probability can be suitably forecast using an ARIMA process. The ARIMA approach to forecasting is based on the following ideas: the forecasts are based on linear functions of

3 3 the sample observations and the aim is to find the simplest models that provide an adequate description of the observed data. Each ARIMA process has three parts: the autoregressive (or AR) part; the integrated (or I) part; and the moving average (or MA) part. The models are often written in shorthand as ARIMA(p, d, q) where p describes the AR part, d describes the integrated part and q describes the MA part. Auto Regressive. This part of the model describes how each observation is a function of the previous p observations. For example, if p =, then each observation is a function of only one previous observation. That is, y(n) = a + a y(n ) + w(n) where y(n) represents the observed value at n, y(n ) represents the previous observed value at n, w(n) represents some random error and a and a are both constants. Other observed values of the series can be included in the right-hand side of the equation if p > : y(n) = a + a y(n ) a p y(n p) + w(n). () Integrated. This part of the model determines whether the observed values are modeled directly, or whether the differences between consecutive observations are modeled instead. If d =, the observations are modeled directly. If d =, the differences between consecutive observations are modeled. If d = 2, the differences of the differences are modeled. In practice, d is rarely more than 2. In this sense, the integrated contribution allows to capture the nonstationarity part of the moments of the stochastic process. If after differencing, a series is stationary, then the series is called integrated of order one and is denoted I(). If, however, the series is not stationary after differencing once, then we might need to take a second difference. If the series becomes stationary after the second difference then it is said to be integrated of order two and is denoted I(2), and so on. That is a nonstationary process is integrated of order d if we need to difference it d times to induce stationary and it is denoted I(d). Although the integrated component can be considered within the AR component by its formulation, its synthesis depends on different factors. Thus, the integrated component also shows the dependence with past values of the series but its synthesis depends on the nonstationary moments of the process. The order d of the integrated component is fixed by the order of the highest nonstationary moment of the stochastic process. In general, the integrated component can be expressed: where: s(n) = c s(n ) c d s(n d) + w(n), (2) c i = ( ) d ( ) i+ i {, 2,..., d}. (3) i For example, a process whose mean is nonstationary and the rest of high order moments are stationaries would have an integrated component of order. This integrated process is the so-called random walk. Moving Average: This part of the model describes how each observation is a function of the previous q errors. For example, if q =, then each observation is a function of only one previous error. In general, x(n) = b w(n) + b w(n ) b q w(n q), (4) where the terms b i are constant coefficients. Here w(n) represents the random error at n and w(n q) represents the previous random error at n q. III. PRELIMINARY ANALYSIS Our preliminary analysis is focused on the study of the revocation codes. Our goal is to find whether it is possible, using this parameter, to get some insights about how the revocation process works in the real world. The real world data that we consider are from the three main CAs: VeriSign, GoDaddy and Entrust. The PKIX/X.59 certificate and CRL specification [3] defines nine reason codes for revocation of a public-key certificate: () keycompromise (2) cacompromise (3) affiliationchanged (4) superseded (5) cessationofoperation (6) certificatehold (7) removefromcrl (8) privilegewithdrawn (9) aacompromise Reason codes can be included as non-critical extensions within the CSI, for instance, in an extension of a CRL. As mentioned, the standard [3] defines the possible revocation reasons and how to include them within the status data but it does not define which should be the revocation practice for each code. As a result, we will see that in practice, revocation reasons are poorly utilized or even ignored by most of the CAs. To illustrate this, let us consider the case of code-signing certificates. For these certificates, VeriSign, which is the overall leading CA in the marketplace, does not provide any information about the revocation reason 2. On the other hand, certificates from the GoDaddy CA use almost always the same revocation reason. In particular, they use the reason number (5) cessationofoperation like a kind of default reason for most of the revoked certificates. This is shown in Figure, in which we covered more than 6, certificates from GoDaddy. To extend the results, we analyze the revocation causes available for 2, revoked certificates issued by Entrust. Figure 2 shows the probability of each revocation cause. In this case, the main reason for a certificate to be revoked is superseding (cause (4)) followed by cessationofoperation (cause (5)). Notice that considering these two causes, we cover around the 92% of the revoked certificates. 2 Actually, VeriSign does not provide revocation causes for any of its issued certificates.

4 4 Others 3% Cessation Of Operation Superseded 96,88% Privilege,% Affiliation Changed,9% Key Compromise,29% Withdrawn,52% Fig. : Revocation causes of code-signing certificates issued by GoDaddy. Superseded 62,96% Cessation Of Operation 28,27% Others 8,77% Affiliation Changed 4,9% Key Compromise 3,9% Unspecified,77% Certificate Hold,% Fig. 2: Revocation causes of code-signing certificates issued by Entrust. The rough analysis performed and the discussion presented evidences that the revocation causes available from the real world do not provide information which we can use to build a rigorous revocation model to predict when or how many revocations are prone to happen. CAs from the real world do not follow any clear guideline about how to use this optional parameter. Versign, the certification market leader, does not provide revocation codes within their CRLs (this might be related with privacy issues), while other CAs like GoDaddy and Entrust use revocation causes in different ways and with a different distribution. Taking these facts into consideration, in the rest of the paper we build a revocation model which is exclusively based on temporal information, namely revocation dates and the life-time of certificates. These parameters are well-defined, compulsory and they will allow us to build a model that will show that certificate revocations are closely related with time. IV. DATA COLLECTION AND PREPROCESSING To analyze the time evolution of the certificate revocation process, we need information about the revoked certificates. To obtain as much information as possible we gathered a large sample of revoked certificates. Those certificates were collected using VeriSign s Certificate Revocation Lists [2]. We choose VeriSign because it is the only certification authority that provides information about the lifetime of the revoked certificates. This information is crucial to develop our prediction model about the percentage of revoked certificates. VeriSign s competitors (e.g. Godaddy or Entrust) do not publicize information about the lifetime of the revoked certificates. Moreover, VeriSign is the trusted provider of Internet infrastructure services for the networked world that leads the global SSL marketplace with a 47.52% share [2]. Therefore, though the data collected belongs exclusively to a single certification authority, the model is expected to be useful for any other CA as the data covers almost half of the global marketplace. For the purpose of this paper, we consider the two main types of certificates (see Table I for details): certificates for SSL servers and code-signing certificates. Accordingly, we also use two different types of CRL files from VeriSign website and from these CRLs we obtain the following parameters: Last Update instant of the CRL. Next Update instant of the CRL. Serial Number of each revoked certificate. Revocation Date of each revoked certificate. It is worth to mention that typically, a revoked and expired certificate remains in the CRL for one additional CRL publication interval. However, due to VeriSign certification practice statement, certificates from VeriSign s CRLs are removed after they expire. Therefore, the collected dataset covers only nonexpired revoked certificates. On the other hand, our goal is to perform a time series analysis of the percentage of weekly revoked certificates. That is to say, for each week, we want to compute the ratio between the number of certificates that are going to be revoked during the week over the number of certificates that are valid at the end of the week. Valid certificates are those certificates which are non-expired and non-revoked. Since the amount of valid certificates at each moment is not publicly made available by VeriSign, we cannot directly calculate this ratio. However, we can use an indirect strategy to calculate a proportional ratio following the same procedure as in [8], [9], []. The idea is to obtain a subset of valid certificates for considered weeks proportional to the full set of valid certificates. To do so, for each certificate that is in our data set (the set of collected CRLs) we obtain its serial number, its revocation date and its issuance date (this last parameter is not present in CRLs but we can obtain it through the VeriSign web interface using the serial numbers of certificates). Notice that with this information from our dataset, we are able to compute a subset of valid certificates for the considered week, that is, certificates that were issued before the considered week and that will be revoked beyond the considered week. We can name this subset of valid certificates for each week as to-be-revoked valid certificates. Figure 4 shows the different sets of certificates according to their status for any given week. Issued non-expired certificates valid to-be-revoked revoked certificates certificates certificates Fig. 4: Sets of certificates according to their status. For the rest of the paper, we will simply refer to the weekly percentage of revoked certificates as the ratio between the

5 5 File Name # Certificates CA Name Description VeriSign International Server CA Class VeriSign International Server CA Class 3 Issues Global Server SGC certificates. Class3Code-Signing2.996 VeriSign Class 3 Code Signing 2 CA Legacy issuer of Code Signing certificates. Issues code signing and object signing certificates for use with Netscape browsers, Microsoft Internet Explorer browsers, Microsoft Office, Sun Java Signing, Macromedia, and Marimba. TABLE I: Description of the collected CRLs. Percentage of weekly revoked certificates 5% 4% 3% 2% % % Q 28 Q 29 Q 2 Q 2 Q 22 (a) SSL (SGC) certificates Percentage of weekly revoked certificates 7% 6% 5% 4% 3% 2% % % Q 22 Q 23 Q 24 Q 25 Q 26 Fig. 3: Weekly percentage of revoked certificates evolution (b) Code-signing certificates set of certificates that are going to be revoked during the considered week over the set of to-be-revoked valid certificates for this week. Notice that this method does not compromise the validity of our model since we are interested in modeling the revocation pattern and its statistical properties. To get absolute values, just a change of scale is needed. Figure 3 shows a plot of the weekly revocation percentages for SSL and code-signing certificates that we computed with the available data from VeriSign. Now, we build a single time series by concatenating the time-series of Figure 3 to obtain general statistical properties (the result of this concatenation is plotted in Figure 5). Analyzing the statistical properties of the concatenated timeseries we observe that: On average, we observe that the ratio of the percentage of revoked certificates is approximately 2%. As we have approximated the valid certificates by the number of valid certificates to be revoked, this means that less than 2% of the issued certificates are revoked weekly. The percentage of weekly revoked certificates exhibits a highly variable behavior. The standard deviation of the percentage of revoked certificates is almost 75% of the mean (µ =.245, σ =.83). Following the probability analysis performed in some previous works ([8] and [9]), we also try to fit the probability density function (pdf) of the concatenated time-series of Figure 5 to an exponential distribution. As in the previous works, we also find that the empirical data, while not exactly, roughly follow an exponential distribution (see Figure 6). Fairly similar results were obtained in [8], [9]. This is remarkable since the mentioned previous works use datasets with different temporal Density empirical distribution exponential fit (µ=.324) Percentage of revoked certificates Fig. 6: Empirical data vs. fitted exponential PDF. ranges. This gives us the intuition that the revocation process follows some type of temporal pattern no matter which is the dataset used. Following this intuition, in the next section we follow a novel approach for modeling the revocation process which has not been explored by any other previous work. Our approach consists in analyzing the concatenated time-series of the weekly percentage of revoked certificates by means of an ARIMA process. Following this technique, we obtain a single model that predicts extremely well the weekly revocation percentage of both SSL and code-signing certificates. Finally, the outstanding behavior of our predictions will be asserted by applying different tests over the developed model. V. MODELING THE REVOCATION In this section we develop a new model for the percentage of revoked certificates. Our model might be interesting for several reasons: on one hand, it provides some insights about the revocation process. On the other hand, it allows CAs to

6 6 Ratio of the percentage of revoked certificates 7% 6% 5% 4% 3% 2% % time (weeks) Fig. 5: Concatenated time-series. make predictions about certificate revocation which might be useful in some scenarios (see Section VII). So, we want to obtain a model from the revocation timeseries to obtain a suitable model for revocation forecasting. For this purpose, one of the simplest techniques is to use a Multiple Linear Regression (MLR). Linear regression is useful for exploring the relationship of an independent variable to a dependent variable when the relationship is linear. However, MLR has drawbacks when the time-series exhibits high correlation. Correlation means that the value of the considered parameter at one time is influenced by values of the parameter at previous times. This happens when the values of the dependent variable over time are not randomly distributed. In our case, we will find that for the time-series of the revocation percentage, the error residuals are correlated with their own lagged values. This serial correlation violates the standard assumption of regression theory that disturbances are not correlated with other disturbances. If there are lagged dependent variables set as the regressors, regression estimates are biased and inconsistent. Fortunately, this can be fixed using an Autoregressive Integrated Moving Average Model (ARIMA). Thus, as we have found that the simplest analysis, the MLR, is not suitable to develop our forecasting model, we will use the more complete ARIMA. To do so, in the rest of the section we first we describe each of the component of the ARIMA process in the Z-domain. Then, we characterize the ARIMA model that best fits the revocation process. That is, we calculate the coefficients of the different ARIMA components to fit the collected revocation data. As we will show, these coefficients will allow to build a suitable predictor to forecast revocations. A. ARIMA processes in the Z-domain In section II-B we have described ARIMA processes in the time-domain. However, as any linear system, an ARIMA process can be expressed by a difference equation involving the input series and the output series. If we Z-transform the difference equation, and reorganize the equation we can compute what is called the transfer function of the system. This function completely defines the behavior of a the linear system and makes it easier its management. In this sense we use the delay operator z [2] to Z- transform the time-domain expression of an ARIM A(p, d, q) process. To that end, we Z-transform the autoregressive component, moving average component and the integrated component. In Figure 7 a scheme of the ARIMA model is shown. Note that, as it is shown in the figure, we can express the transfer function of the ARIMA(p, d, q) process as a cascade of all three components. s(n) C(z) y(n) A - (z) x(n) B(z) Fig. 7: Components of an ARIMA process. w(n) First we Z-transform the moving average component. A MA(q) stochastic process is one that is generated using the difference equation expressed in (4). Applying the Z-transform to equation (4) we can express the MA process in the z-domain as: B(z) = b + b z + b 2 z b q z q. (5) Note that it only uses previous samples of the input signal. The main features of the associated generating system are that it is Linear time-invariant (LTI), causal and stable. The MA system is Finite Impulse Response (FIR) and, therefore, an all-zero system. In this sense, Figure 8 represents the M A(q) as a FIR filter whose transfer function is B(z): wn ( ) b bz b z b z 2 q 2... q Fig. 8: MA filter. q xn ( ) bwn ( k) k k An AR(p) stochastic process is one that is generated using the difference equation expressed in (). This is a quite general situation in which it is reasonable to think that a given sample of a time-series depends linearly on previous samples plus some random error. In this sense, the transfer function of AR(p) process in the z-domain is express as:

7 7 A(z) = + a z + a 2 z a p z p. (6) The impulse response of the associated system is Infinite Impulse Response (IIR) and its transfer function is of the kind all-pole. Note that, this time, the autocorrelation is not limited and it tends to when the lag tends to infinity, only if the module of all its poles is strictly smaller than. That means that if this condition is met, then the AR(p) process is ergodic. Figure 9 represents the AR(q) as an IIR filter whose transfer function is A(z): x( n) az az... a z 2 p 2 p Fig. 9: AR filter. yn ( ) wn ( ) ayn ( k) p k k Finally, we can also express integrated component in the z-domain from equation (2): C(z) = ( z ) d. (7) In the same way as the autoregressive and moving average components of the ARIMA process, we can represent the integrated component as a linear filter. Figure represents the I(d) as a linear filter whose transfer function is C(z): y( n) d ( z ) Fig. : Integrated filter. s( n) w(n) c s( nk) d k k Finally, the general expression of an ARIMA(p, d, q) process can be expressed by its Z-transform as: S(z) = [B(z)A(z)C(z)] W (z). (8) Understanding expression (8) as the relationship between the input w(n) and the output s(n) of a digital filter in a given instant n, the transfer function of the filter H(z) could be defined as: H(z) = S(z) = B(z)A(z)C(z). (9) W (z) It is worth noting that the factors of the transfer function follow the reverse order of the synthesis of the model. However, the order of the system in the cascade can be rearranged without affecting the characteristics of the overall combination. Hence, it is equivalent to changing the order by the commutative property for linear systems. Figure represents the ARIMA filter with transfer function H(z): wn ( ) b bz b z... b z sn ( ) 2 q 2 q 2 p d 2 p ) ( az az... a z ( z ) Fig. : ARIMA filter. Note also that the roots of the polynomial B(z) correspond to the zeros of the filter and the zeros of A (z) and C (z) to the poles. According to the definition of the c i values expressed in (3), the integrated order defines the multiplicity of the pole in z =. This pole generates the instability of impulsional response. The rest of obtained poles (z k ) will be found in the unit circle ( z k < ) of the Z plane. B. Characterization of the revocations as an ARIMA process In this section, we show that the actual behavior of the revocation process can be modeled as an ARIMA process. To that end, a new ARIMA model for the revocations has been developed to find the predictor. The steps we follow to model the revocation process can be summarized as follows: ) Testing for stationarity of the time series. 2) If the series is not stationary, transforming it to a stationary series by differencing: a) Estimating the degree of differencing. b) Differencing the time series to obtain a stationary series. 3) Identifying the ARMA components. a) Estimating the order of the AR component and the MA component from the stationary series. b) Extracting the ARMA parameters. 4) Model fit validation using residual diagnostics The result of carrying out these steps will be an ARIMA model defined by: an order d that represents the number of nonseasonal differences for the I component of the process. q coefficients that characterize the MA component of the process. p coefficients that characterize the AR component of the process. Knowing these coefficients, any CA could use the ARIMA model to predict which weeks are more prone to suffer from revocation in a near future. ) Model Identification: The first step in developing the ARIMA model is to determine if the series is stationary and if there is any significant seasonality that needs to be modeled. In the following we show that the global revocation time series is nonstationary and does not present a seasonal pattern. The aim of this first step is to calculate the order of differencing d to achieve stationarity. Once we have obtained a stationary time series we will be able to model it as an ARMA process. First of all, we start testing for stationarity. To test stationarity, first we analyzed the Autocorrelation Function (ACF) of the percentage of revoked certificates (see Figure 2). We can observe that the actual time series follows certain trend, so the time series is nonstationary. The temporal series of the percentage of revoked certificates presents a slow variation of the mean. To confirm this visual evaluation, we perform a KPSS test [22] at the 99% confidence level which rejects the null hypothesis of stationarity.

8 8 Sample Autocorrelation Lag Fig. 2: ACF of the percentage of revoked certificates. Once we have confirmed that the time series is nonstationary, we have to find the integrated component. The long range dependence complicates the development of a predictor because the temporal series shows an apparent non stationary mean. To synthesize a good predictor it is necessary to capture this long term effect. The long term dependence produces that the mean varies. This variation reaches maximum and minimum levels which are very distant (see Figure 3). However, the variance remains almost constant. This allows to conclude that the integrated component of the model should be of order and its associated transfer function C(z) = ( z ). Density y n y n Gaussian fit Fig. 3: PDF of the extracted integrated component time series. Sample Autocorrelation Lag Fig. 4: ACF of the extracted integrated component time series. Next, it is necessary to extract the integrated component of the actual process s(n) to determine which are the values of the AR and MA components. According to the scheme presented in Figure 7 the residual ARMA series y(n) and the real series s(n) are related as follows: Y (z) = C(z) S(z) = ( z ) S(z). () In this way, the temporal series y(n) will be obtained at the output of the FIR (Finite Impulse Response) filter, whose transfer function is ( z ), when it is excited with the temporal series generated by the coder. It can be checked that the temporal series y(n) is a stochastic process with mean and an invariant autocorrelation coefficients. This statistical analysis has been carried out with the data gathered from VeriSign and with autocorrelation lags of units. The probability distribution function fits a Gaussian distribution. At this point we have to check whether the time series without the integrated component is white noise or not. We check (at a confidence level of 99% and 7 lags) that y(n) is not white noise by means of Ljung-Box Q-test []. The visual analysis of the autocorrelation of y(n) confirms the result of this test (see Figure 4). The fact that y(n) is not white noise allows us to model it be means of an ARMA process. 2) Estimation of the ARMA coefficients: In this section, we determine the best ARMA model that fits y(n). To that end, first we estimate the number of coefficients needed to capture the autoregressive component of the process. Then, we calculate the value of these coefficients. Once we have modeled the AR(p) component, we estimate the number of coefficients that model the moving average component of the process. Finally, we calculate the values of the MA coefficients. It must be noted that we use the Bayesian Information Criterion (BIC) [] for model selection among the different set of ARMA models with different numbers of parameters. That information criterion penalizes models with additional parameters. Therefore, the BIC model order selection criteria are based on parsimony. Along with the BIC criterion we also try to minimize the correlation of the residuals. Using these criteria, the order of the AR process found is. Once the order the AR process has been determined, we use Least Squares estimation to calculate the coefficients of the AR component. A(z) = +.642z z z z z z z z z z. () The MA component can be analyzed when the AR component of the y(n) series is withdrawn. Applying the above explained technique for the integrative component the x(n) series can be derived using the relation between the y(n) and x(n) series: X(z) = A(z)Y (z) = ( +.642z z z z z z z z z z )Y (z). (2) Using a FIR filter with transfer function A (z) the series x(n) can be obtained at the output of this filter when y(n) is applied at the input. To estimate the parameters of the MA process, least square estimation is applied to fit the partial autocovariance function of x(n) []. We use the same criteria as in the AR process for selecting the parameters of the MA

9 9 s(n) - - a' a' a ' sˆ ( n ) b b b2 b6 b 6 b b b b 2 b b b Fig. 5: ARIMA Predictor. i a i b i TABLE II: Coefficients of the ARIMA predictor. process. The best adjustment is obtained with a MA process with order 6. B(z) =.3558z +.639z z z z 5.775z 6. (3) As the integrated component of the obtained model has order, the integrated and the autoregressive components can be written together in the following way: A (z) = A(z)C(z) = A(z) ( z ). (4) Therefore, the generated series can be expressed as: s(n) = b w(n) + + b q w(n q) + a s(n ) + + a p+s(n p ), (5) where the coefficients are obtained applying the inverse Z transform to A (z), that is: A (z) = +.647z.792z 2.234z z 4.49z 5.67z z z z z.73z. (6) 3) Model Diagnostic Checking: Finally, to check that the model is not misspecified, we run again the Ljung-Box Q-test at a confidence level of 99% and 7 lags. The test results in the acceptance of the null hypothesis that the model fit is adequate (no serial correlation at the corresponding element of lags). VI. REVOCATION FORECASTING Once we have developed an ARIMA model for the timeseries of the weekly revocation percentage, in this section we use this model to build an ARIMA predictor. Then, we check the goodness of the predictions for the concatenated revocation time-series and also for each type of certificate. First, we start by obtaining an expression of the residual series to check whether it follows a Gaussian distribution or not. From (5), the (n + ) sample prediction is: ŝ(n + ) = b ŵ(n + ) + + b q w(n q + ) + a s(n) + + a p+s(n p). (7) Nevertheless, in the prediction context the values of the w(n) series must be figured out. The predictor will have only the previous values of the s(n) series. Moreover, the ŵ(n+) is a future value. The forecast value of ŵ(n + ) will be the mean value of the w(n) series. In this case, the mean value is. Thus, the (n + ) sample prediction can be simplified as: ŝ(n + ) = b w(n) + + b q w(n q + ) + a s(n) + + a p+s(n p). (8) To determine w(n) as a function of s(n), we conduct some algebraic manipulations. From (5), it is also possible to write: ŝ(n) = b ŵ(n ) + + b q w(n q) + a s(n ) + + a p+s(n p ). (9) Subtracting (9) to (5): s(n) ŝ(n) = b (w(n) ŵ(n)). (2) As it has been mentioned, the forecast value of ŵ(n) will be, so:

10 Therefore: s(n) ŝ(n) = b w(n). (2) Correlation w(n) = s(n) ŝ(n) b. (22) To evaluate the behavior of the above transfer function, an analysis of the forecast errors has been done. Figure 6 presents the residuals autocorrelation and the 99% confidence intervals. The residual diagnostic determines that the forecast errors are clearly uncorrelated lag Fig. 8: ACF of the residual series for SGC certificates Correlation Correlation lag Fig. 9: ACF of the residual series for Code-signing certificates lag Fig. 6: Autocorrelation function of the forecast errors using the ARIMA predictor. Figure 7 presents the CDF of the residuals autocorrelation and the CDF of standard Gaussian distribution with its 99% confidence intervals. Notice that the residuals are close to the Gaussian distribution. As it is shown below, the estimated ARIMA model is appropriate for forecasting. Therefore, the ARIMA model fits well the behavior of the revocations. Cumulative probability residuals Gaussian 99% confidence bounds Residuals Fig. 7: CDF of the ARIMA prediction residuals. Once we have seen that the residuals are quite close to the Gaussian distribution, we obtain an expression for the ahead prediction. Replacing this expression in the equation (8), the (n + ) sample prediction can be written as: ŝ(n + ) = b [b (s(n) ŝ(n)) + b 2 (s(n ) ŝ(n )) + + b q (s(n q + ) ŝ(n q + ))] + a s(n) + + a p+s(n p). (23) From this expression, we can plot the derived ARIMA predictor using the coefficients obtained in the previous section (see Figure 5). The predictor supplies the estimated value for the (n + ) sample as a function of the n previous ones. This set of samples can be used also to obtain a prediction of the samples 2 ahead, 3 ahead, etc. Running the predictor with the (n + j) sample estimation, it supplies an estimated value of the (n + j + ) sample. Finally, to check that the model is not misspecified, we run again the Ljung-Box Q-test at a confidence level of 99% and 7 lags. The test results in the acceptance of the null hypothesis that the model fit is adequate (no serial correlation at the corresponding element of lags). Once we have seen that the model fits quite accurately the global revocation process, we must check its suitability for each type of certificate. For this purpose, we analyze the residuals for individual revocation processes using the ARIMA model obtained from the global series. Figures 8 and 9 present the residuals autocorrelation and the 99% confidence intervals for each type of certificates. Note that there is no residual that exceeds the confidence intervals. Therefore, we can conclude that the ARIMA model developed from the concatenated time-series captures the revocation pattern of both certificate types. Finally, in figures 2 and 2 the ahead, 2 ahead and 3 ahead predictions are presented for the percentage of revoked certificates. It is evidenced from the figure that one-step ahead out-sample forecasts follow the actual revocation data more closely than k-step ahead out-sample forecasts. As expected, the k-step ahead out-sample forecasts accumulate the error

11 .5 % Revoked certificates Original series ahead prediction 2 ahead prediction 3 ahead prediction time (weeks) Fig. 2: Predictions for SGC certificates. % Revoked Certificates Original series ahead prediction 2 ahead prediction 3 ahead prediction time (weeks) Fig. 2: Predictions for code-signing certificates. terms resulting in low accuracy in forecasting performances. Again, the predictions are valid for both certificate type, corroborating the results obtained from the residual analysis. VII. SOME APPLICATIONS OF REVOCATION FORECASTING In this section, we briefly describe some possible scenarios in which revocation forecasting might be useful. However, a detailed study of all the possible applications of revocation forecasting is beyond the scope of this paper. The first quite straightforward application of revocation forecasting is to use it to set the validity period of the CRLs. More precisely, the validity period of the CRLs could be set as a function of the predicted revocation percentage. In this way, the CA could issue CRLs with short validity periods if the predictor forecasts many revocations, and viceversa. In a wired network, this might seem a subtle enhancement since there is always the possibility of issuing CRLs with small validity periods. As in wired networks, bandwidth is not scarce and connections are stable, the risk of operating with a revoked certificate can be made fairly small by frequently issuing CRLs. However, this is not the case of some new communication paradigms like Delay and Disruption Tolerant Networks (DTN). In a DTN, applications must opportunistically exploit connectivity over intermittent links [23]. Regarding security, one of the main challenges in DTNs is how to create and distribute keys and credentials. To this respect, many authors [24], [25] and the current security draft specification for DTN [26] agree that the most promising solution is to use publickey cryptography with digital certificates. An example of this paradigm are vehicular communications (VANET) in which vehicles might not be always connected to the infrastructure (Internet). In this case, PKI users (vehicles) might not dispose of the latest CRL available. The question is whether to operate or not with a certificate that might be revoked, considering that the only information that we have is an obsolete CRL. Obviously, if the CRL is old, the risk is higher than if it is recent. The problem is to distinguish between what is old and what is recent. For instance, let us consider that a PKI user has a copy of a CRL which was issued a couple of hours ago. Two hours may not be considered a long time if the revocation percentage is around 5 but this interval can be considered quite long if we are going to

12 2 have a % of revoked certificates during the next two hours. Here, the forecasting mechanism could be used to properly set the time-stamps (validity periods) of the CRLs so that they provide the user with an idea about how revocation process is behaving and thus, how risky is operating with other users certificates. Furthermore, if a more precise criterion is desired, the CA could include the parameters of the forecasting model inside the CRL in one of the so-called extension fields. In this way, PKI users might use predictions to evaluate the risk of operating with other user s certificates when connection to the infrastructure is not available. Another type of scenario in which revocation forecasting can be applied is dynamic delegation [27], [28], [29]. Dynamic delegation is devised for highly distributed scenarios like Web Services [3]. In these scenarios users delegate certain credentials or attributes to perform a certain task by issuing certificates. In this context, some authors propose to use shortlived certificates avoiding the need of a revocation system. However, if we use a short-lived certificate to perform some tasks and the validity period of the certificate is lower than the one required by the task, we will need to contact the certification authority to get a new certificate to finish the task. This is a problem mainly in long-term jobs [3]. For this reason, the GT4 group of the Globus consortium considers that a good option for these long-term jobs is to use longlived certificates and a revocation mechanism [32]. In this scenario, a revocation forecasting model could be useful to set the validity period of the certificates and/or its associated CRLs. VIII. CONCLUSIONS We have analyzed real empirical data to derive a model which allows to forecast the percentage of revocations in the near future. Our research represents a step towards linking empirical observations to mathematical models in description of the complex issue of certificate revocation. This paper has proposed an ARIMA model for shortrange forecasting in a certificate status information distribution system. The ARIMA model completely considers the dynamic process of data series and the autocorrelation of residuals to achieve precise forecasting of the percentage of revoked certificates. We used the Box-Jenkins methodology as a framework for our modeling procedure and we built the best ARIMA model possible for the available data. The model exhibits great accuracy for both short (a few weeks) and long (a few months) time scales. Although the collected revocation data only belong to the leading certification authority the model is expected to be valid for other certification providers because of the huge amount of certificates analyzed and because our model captures the general pattern of the temporal correlation that exists among the revocation events. This pattern is expected to be the same for other CAs because the theoretical reasons to revoke certificates (and therefore the temporal correlation) do not essentially differ, no matter which certificate provider you use. ACKNOWLEDGMENTS This work is funded by the Spanish Ministry of Science and Education under the projects CONSOLIDER-ARES (CSD27-4) and P2PSEC (TEC C3-), and by the Government of Catalonia under grant 29 SGR 362 to consolidated research groups. REFERENCES [] R. Housley, W. Polk, W. Ford, and D. Solo. Internet X.59 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 328, Internet Engineering Task Force, April 22. [2] Andre Arnes, Mike Just, Svein J. Knapskog, Steve Lloyd, and Henk Meijer. Selecting revocation solutions for PKI. In NORDSEC 95, 995. [3] M. Lippert, V. Karatsiolis, A. Wiesmaier, and J. Buchmann. Life-cycle management of x.59 certificates based on ldap directories. J. Comput. Secur., 4:49 439, September 26. [4] John Iliadis, Diomidis Spinellis, Dimitris Gritzalis, Bart Preneel, and Sokratis Katsikas. Evaluating certificate status information mechanisms. In Proceedings of the 7th ACM conference on Computer and communications security, CCS, pages 8, New York, USA, 2. ACM. [5] G. F. Marias, K. Papapanagiotou, and P. Georgiadis. Adopt. a distributed ocsp for trust establishment in manets. th European Wireless Conference 25, April 25. [6] T. Perlines Hormann, K. Wrona, and S. Holtmanns. Evaluation of certificate validation mechanisms. Comput. Commun., 29:29 35, February 26. [7] A. Arnes. Public key certificate revocation schemes, 2. Queen s University. Ontario, Canada. Master Thesis. [8] Daryl Walleck, Yingjiu Li, and Shouhuai Xu. Empirical analysis of certificate revocation lists. In Proceeedings of the 22nd annual IFIP WG.3 working conference on Data and Applications Security, pages 59 74, 28. [9] Chengyu Ma, Nan Hu, and Yingjiu Li. On the release of crls in public key infrastructure. In Proceedings of the 5th conference on USENIX Security Symposium - Volume 5, Berkeley, CA, USA, 26. [] Nan Hu, Giri K. Tayi, Chengyu Ma, and Yingjiu Li. Certificate revocation release policies. J. Comput. Secur., 7:27 57, April 29. [] George Edward Pelham Box and Gwilym Jenkins. Time Series Analysis, Forecasting and Control. Holden-Day, Incorporated, 99. [2] Netcraft. Market share of certification authorities, Accessed on 5/2. [3] D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk. Internet X.59 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 528, Internet Engineering Task Force, May 28. [4] R. Housley, W. Ford, W. Polk, and D. Solo. Internet X.59 Public Key Infrastructure Certificate and CRL Profile. RFC 2459, Internet Engineering Task Force, January 999. [5] S. Micali. Efficient certificate revocation. Technical Report TM-542b, MIT Laboratory for Computer Science, 996. [6] M. Naor and K. Nissim. Certificate Revocation and Certificate Update. IEEE Journal on Selected Areas in Communications, 8(4):56 56, 2. [7] M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams. X.59 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP, 999. RFC 256. [8] P.C. Kocher. On certificate revocation and validation. In International Conference on Financial Cryptography (FC98), number 465 in Lecture Notes in Computer Science, pages 72 77, feb 998. [9] R.C. Merkle. A certified digital signature. In Advances in Cryptology (CRYPTO89), number 435 in Lecture Notes in Computer Science, pages , 989. [2] Legal repository from verisign: Crl reference table. Accessed on 5/2. [2] John G. Proakis. Digital communications / John G. Proakis. McGraw- Hill, New York :, 983. [22] Denis Kwiatkowski, Peter C.B. Phillips, and Peter Schmidt. Testing the null hypothesis of stationarity against the alternative of a unit root. Technical Report 979, Cowles Foundation for Research in Economics, Yale University, May 99.

A Model of Certificate Revocation

A Model of Certificate Revocation A Model of Certificate Revocation David A. Cooper Computer Security Division National Institute of Standards and Technology Gaithersburg, MD 2899-893 david.cooper@nist.gov Abstract This paper presents

More information

General principles of digital signature verification

General principles of digital signature verification General principles of digital signature verification 7th November 2002 Contents 1 Abstract 1 2 Terms and definitions 2 3 Introduction 2 4 Establishing the time of digital signature creation by means of

More information

Nord Pool data overview

Nord Pool data overview Nord Pool data overview Contents Prices, consumption, production, flow, price spikes. Prices and price log-returns.............................. Consumption, production and flow.........................

More information

SignEPC : A Digital Signature Scheme for Efficient and Scalable Access Control in EPCglobal Network

SignEPC : A Digital Signature Scheme for Efficient and Scalable Access Control in EPCglobal Network SignEPC : A Digital Signature Scheme for Efficient and Scalable Access Control in EPCglobal Network Roy Ka-Wei LEE School of Information Systems Singapore Management University 80 Stamford Road, Singapore

More information

FORECASTING THE GROWTH OF IMPORTS IN KENYA USING ECONOMETRIC MODELS

FORECASTING THE GROWTH OF IMPORTS IN KENYA USING ECONOMETRIC MODELS FORECASTING THE GROWTH OF IMPORTS IN KENYA USING ECONOMETRIC MODELS Eric Ondimu Monayo, Administrative Assistant, Kisii University, Kitale Campus Alex K. Matiy, Postgraduate Student, Moi University Edwin

More information

IBM SPSS Forecasting 19

IBM SPSS Forecasting 19 IBM SPSS Forecasting 19 Note: Before using this information and the product it supports, read the general information under Notices on p. 108. This document contains proprietary information of SPSS Inc,

More information

Revision confidence limits for recent data on trend levels, trend growth rates and seasonally adjusted levels

Revision confidence limits for recent data on trend levels, trend growth rates and seasonally adjusted levels W O R K I N G P A P E R S A N D S T U D I E S ISSN 1725-4825 Revision confidence limits for recent data on trend levels, trend growth rates and seasonally adjusted levels Conference on seasonality, seasonal

More information

DIFFUSION OF THE INTERNET HOSTS

DIFFUSION OF THE INTERNET HOSTS Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2002 Proceedings Americas Conference on Information Systems (AMCIS) December 2002 DIFFUSION OF THE INTERNET HOSTS Yi-Cheng Ku Fortune

More information

Testing the Predictability of Consumption Growth: Evidence from China

Testing the Predictability of Consumption Growth: Evidence from China Auburn University Department of Economics Working Paper Series Testing the Predictability of Consumption Growth: Evidence from China Liping Gao and Hyeongwoo Kim Georgia Southern University; Auburn University

More information

ARIMA LAB ECONOMIC TIME SERIES MODELING FORECAST Swedish Private Consumption version 1.1

ARIMA LAB ECONOMIC TIME SERIES MODELING FORECAST Swedish Private Consumption version 1.1 Bo Sjo 2011-11-10 (Updated) ARIMA LAB ECONOMIC TIME SERIES MODELING FORECAST Swedish Private Consumption version 1.1 Send in a written report to bosjo@liu.se before Wednesday November 25, 2012. 1 1. Introduction

More information

Forecasting Construction Cost Index using Energy Price as an Explanatory Variable

Forecasting Construction Cost Index using Energy Price as an Explanatory Variable Forecasting Construction Cost Index using Energy Price as an Explanatory Variable Variations of ENR (Engineering News Record) Construction Cost Index (CCI) are problematic for cost estimation and bid preparation.

More information

George Box and Gwilyni Jenkins

George Box and Gwilyni Jenkins A GUIDE TO BOX-JENKINS MODELING By George C. S. Wang Describes in simple language how to use Box-Jenkins models for forecasting... the key requirement of Box-Jenkins modeling is that time series is either

More information

SOCIAL MEDIA MINING. Behavior Analytics

SOCIAL MEDIA MINING. Behavior Analytics SOCIAL MEDIA MINING Behavior Analytics Dear instructors/users of these slides: Please feel free to include these slides in your own material, or modify them as you see fit. If you decide to incorporate

More information

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On-Premise Software

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On-Premise Software Comparing Cost of Ownership: Symantec Managed PKI Service vs. On-Premise Software Who should read this paper Deploying and managing a PKI solution can be a complex undertaking. This is particularly the

More information

Comparative study on demand forecasting by using Autoregressive Integrated Moving Average (ARIMA) and Response Surface Methodology (RSM)

Comparative study on demand forecasting by using Autoregressive Integrated Moving Average (ARIMA) and Response Surface Methodology (RSM) Comparative study on demand forecasting by using Autoregressive Integrated Moving Average (ARIMA) and Response Surface Methodology (RSM) Nummon Chimkeaw, Yonghee Lee, Hyunjeong Lee and Sangmun Shin Department

More information

Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks

Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks Arif Sari School of Applied Sciences, Department of Management Information Systems, European University

More information

DRAFT FOR DISCUSSION AND REVIEW, NOT TO BE CITED OR QUOTED

DRAFT FOR DISCUSSION AND REVIEW, NOT TO BE CITED OR QUOTED DRAFT FOR DISCUSSION AND REVIEW, NOT TO BE CITED OR QUOTED USING MISSPECIFICATION TESTS ON WITHIN-SAMPLE MODELS AND CONSIDERING THE TRADE-OFF BETWEEN LEVEL AND SIGNIFICANCE AND POWER TO PROMOTE WELL-CALIBRATED,

More information

Real Estate Modelling and Forecasting

Real Estate Modelling and Forecasting Real Estate Modelling and Forecasting Chris Brooks ICMA Centre, University of Reading Sotiris Tsolacos Property and Portfolio Research CAMBRIDGE UNIVERSITY PRESS Contents list of figures page x List of

More information

Time-Aware Service Ranking Prediction in the Internet of Things Environment

Time-Aware Service Ranking Prediction in the Internet of Things Environment sensors Article Time-Aware Ranking Prediction in the Internet of Things Environment Yuze Huang, Jiwei Huang *, Bo Cheng, Shuqing He and Junliang Chen State Key Libratory of Networking and Switching Technology,

More information

Mobile Agent Code Updating and Authentication Protocol for Code-centric RFID System

Mobile Agent Code Updating and Authentication Protocol for Code-centric RFID System Mobile Agent Code Updating and Authentication Protocol for Code-centric RFID System 1 Liang Yan, 2 Hongbo Guo, 3 Min Chen, 1 Chunming Rong, 2 Victor Leung 1 Department of Electrical Engineering and Computer

More information

Blockchain Role in Smart Cities/IoT Security A Cryptographic Perspective!

Blockchain Role in Smart Cities/IoT Security A Cryptographic Perspective! SESSION ID: CCS-T08 Blockchain Role in Smart Cities/IoT Security A Cryptographic Perspective! Dr. Hilal Houssain hilal.hussein@gmail.com Agenda Internet of Things (IoT) IoT Security Requirements IoT Security

More information

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

More information

Department of Economics, University of Michigan, Ann Arbor, MI

Department of Economics, University of Michigan, Ann Arbor, MI Comment Lutz Kilian Department of Economics, University of Michigan, Ann Arbor, MI 489-22 Frank Diebold s personal reflections about the history of the DM test remind us that this test was originally designed

More information

Univariate Time Series Modeling for Traffic Volume Estimation

Univariate Time Series Modeling for Traffic Volume Estimation Urban Mobility-Challenges, Solutions and Prospects at IIT Madras BITS Pilani Pilani Campus Univariate Time Series Modeling for Traffic Volume Estimation Presented by: KARTIKEYA JHA & SHRINIWAS S. ARKATKAR

More information

uimivtrslty Of ILLINOIS LIBRARY AI URBANA-CHAMPA1GN STACKS

uimivtrslty Of ILLINOIS LIBRARY AI URBANA-CHAMPA1GN STACKS uimivtrslty Of ILLINOIS LIBRARY AI URBANA-CHAMPA1GN STACKS Digitized by the Internet Archive in 2011 with funding from University of Illinois Urbana-Champaign http://www.archive.org/details/onautomationofbo500hopw

More information

Analysis of Spanish Wholesale Gas Price Determinants and Non-stationarity Effects for Modelling

Analysis of Spanish Wholesale Gas Price Determinants and Non-stationarity Effects for Modelling Analysis of Spanish Wholesale Gas Price Determinants and Non-stationarity Effects for Modelling Cansado-Bravo P A 1, Rodríguez-Monroy C 2, Mármol-Acitores G 3 Abstract This study expands on previous research

More information

Jetstream Certification and Testing

Jetstream Certification and Testing PJM Interconnection 02/01/2016 This page is intentionally left blank. PJM 2016 www.pjm.com 2 P age Introduction Document Description PJM maintains and publishes a list of certified devices, software packages

More information

Application of Decision Trees in Mining High-Value Credit Card Customers

Application of Decision Trees in Mining High-Value Credit Card Customers Application of Decision Trees in Mining High-Value Credit Card Customers Jian Wang Bo Yuan Wenhuang Liu Graduate School at Shenzhen, Tsinghua University, Shenzhen 8, P.R. China E-mail: gregret24@gmail.com,

More information

Greek Presidency of the European Union

Greek Presidency of the European Union Greek Presidency of the European Union! Introduction PKI Services in the Public Sector of the EU Member States Page 0-1 of 0-10 Research Team Dr. Stefanos Gritzalis, Asst. Prof. of I&C Systems Security

More information

UBS increases efficiency and security using Qualified Electronic Signatures.

UBS increases efficiency and security using Qualified Electronic Signatures. UBS increases efficiency and security using Qualified Electronic Signatures. As one of the world s largest banks, UBS is transforming its services through digitization by offering clients remote electronic

More information

CHAPTER 5 RESULTS AND ANALYSIS

CHAPTER 5 RESULTS AND ANALYSIS CHAPTER 5 RESULTS AND ANALYSIS This chapter exhibits an extensive data analysis and the results of the statistical testing. Data analysis is done using factor analysis, regression analysis, reliability

More information

COORDINATING DEMAND FORECASTING AND OPERATIONAL DECISION-MAKING WITH ASYMMETRIC COSTS: THE TREND CASE

COORDINATING DEMAND FORECASTING AND OPERATIONAL DECISION-MAKING WITH ASYMMETRIC COSTS: THE TREND CASE COORDINATING DEMAND FORECASTING AND OPERATIONAL DECISION-MAKING WITH ASYMMETRIC COSTS: THE TREND CASE ABSTRACT Robert M. Saltzman, San Francisco State University This article presents two methods for coordinating

More information

Ensemble Learning for Large-Scale Workload Prediction

Ensemble Learning for Large-Scale Workload Prediction Received 2 July 2013; revised 3 January 2014; accepted 10 January 2014. Date of publication 7 April 2014; date of current version 30 July 2014. Digital Object Identifier 10.1109/TETC.2014.2310455 Ensemble

More information

Statistical Models for Corporate Bond Rates

Statistical Models for Corporate Bond Rates Statistical Models for Corporate Bond Rates An Honors Thesis (ID 499) by Michelle Ford Thesis Director Beekman Ball state University Muncie, Indiana May 1994 Expected date of graduation: May 1994,.-...

More information

Introduction to Research

Introduction to Research Introduction to Research Arun K. Tangirala Arun K. Tangirala, IIT Madras Introduction to Research 1 Objectives To learn the following: I What is data analysis? I Types of analyses I Different types of

More information

Limits of Software Reuse

Limits of Software Reuse Technical Note Issued: 07/2006 Limits of Software Reuse L. Holenderski Philips Research Eindhoven c Koninklijke Philips Electronics N.V. 2006 Authors address: L. Holenderski WDC3-044; leszek.holenderski@philips.com

More information

General notice: Other product names mentioned herein are used for identification purposes only and may be trademarks of their respective companies.

General notice: Other product names mentioned herein are used for identification purposes only and may be trademarks of their respective companies. i SPSS Trends 16.0 For more information about SPSS software products, please visit our Web site at http://www.spss.com or contact SPSS Inc. 233 South Wacker Drive, 11th Floor Chicago, IL 60606-6412 Tel:

More information

Temporal Modelling of Producer Price Inflation Rates of Ghana

Temporal Modelling of Producer Price Inflation Rates of Ghana IOSR Journal of Mathematics (IOSR-JM) e-issn: 2278-3008, p-issn:2319-7676. Volume 10, Issue 3 Ver. I (May-Jun. 2014), PP 70-77 Temporal Modelling of Producer Price Inflation Rates of Ghana Francis Okyere

More information

A simple model for low flow forecasting in Mediterranean streams

A simple model for low flow forecasting in Mediterranean streams European Water 57: 337-343, 2017. 2017 E.W. Publications A simple model for low flow forecasting in Mediterranean streams K. Risva 1, D. Nikolopoulos 2, A. Efstratiadis 2 and I. Nalbantis 1* 1 School of

More information

M. Zhao, C. Wohlin, N. Ohlsson and M. Xie, "A Comparison between Software Design and Code Metrics for the Prediction of Software Fault Content",

M. Zhao, C. Wohlin, N. Ohlsson and M. Xie, A Comparison between Software Design and Code Metrics for the Prediction of Software Fault Content, M. Zhao, C. Wohlin, N. Ohlsson and M. Xie, "A Comparison between Software Design and Code Metrics for the Prediction of Software Fault Content", Information and Software Technology, Vol. 40, No. 14, pp.

More information

Chapter 3. Database and Research Methodology

Chapter 3. Database and Research Methodology Chapter 3 Database and Research Methodology In research, the research plan needs to be cautiously designed to yield results that are as objective as realistic. It is the main part of a grant application

More information

Modelling and Forecasting the Balance of Trade in Ethiopia

Modelling and Forecasting the Balance of Trade in Ethiopia American Journal of Theoretical and Applied Statistics 2015; 4(1-1): 19-23 Published online March 18, 2015 (http://www.sciencepublishinggroup.com/j/ajtas) doi: 10.11648/j.ajtas.s.2015040101.14 ISSN: 2326-8999

More information

Short-Term Forecasting with ARIMA Models

Short-Term Forecasting with ARIMA Models 9 Short-Term Forecasting with ARIMA Models All models are wrong, some are useful GEORGE E. P. BOX (1919 2013) In this chapter, we introduce a class of techniques, called ARIMA (for Auto-Regressive Integrated

More information

Lawrie Brown Grigori Goldman

Lawrie Brown Grigori Goldman Periodical Payments Using X.509 Restricted Proxy Certificates Lawrie Brown Grigori Goldman January 2010 University of New South Wales @ Australian Defence Force Academy Who Am I? senior lecturer at UNSW@ADFA

More information

Econometric Modeling and Forecasting of Food Exports in Albania

Econometric Modeling and Forecasting of Food Exports in Albania Econometric Modeling and Forecasting of Food Exports in Albania Prof. Assoc. Dr. Alma Braimllari (Spaho) Oltiana Toshkollari University of Tirana, Albania, alma. spaho@unitir. edu. al, spahoa@yahoo. com

More information

Lightweight Cryptography for RFID Systems

Lightweight Cryptography for RFID Systems Lightweight Cryptography for RFID Systems Guang Gong Department of Electrical and Computer Engineering University of Waterloo CANADA G. Gong (University of Waterloo)

More information

Analyzing And Modelling Sewage Discharge Process Of Typical Area Using Time Series Analysis Method

Analyzing And Modelling Sewage Discharge Process Of Typical Area Using Time Series Analysis Method City University of New York (CUNY) CUNY Academic Works International Conference on Hydroinformatics 8-1-2014 Analyzing And Modelling Sewage Discharge Process Of Typical Area Using Time Series Analysis

More information

FORECASTING ANALYSIS OF CONSUMER GOODS DEMAND USING NEURAL NETWORKS AND ARIMA

FORECASTING ANALYSIS OF CONSUMER GOODS DEMAND USING NEURAL NETWORKS AND ARIMA International Journal of Technology (2015) 5: 872-880 ISSN 2086-9614 IJTech 2015 FORECASTING ANALYSIS OF CONSUMER GOODS DEMAND USING NEURAL NETWORKS AND ARIMA Arian Dhini 1*, Isti Surjandari 1, Muhammad

More information

The Cryosphere Discussions

The Cryosphere Discussions The Cryosphere Discuss., 5, C1956 C1971, 2012 www.the-cryosphere-discuss.net/5/c1956/2012/ Author(s) 2012. This work is distributed under the Creative Commons Attribute 3.0 License. The Cryosphere Discussions

More information

MODELING OF EXPORTS IN ALBANIA

MODELING OF EXPORTS IN ALBANIA MODELING OF EXPORTS IN ALBANIA Prof. Assoc. Dr. Alma Braimllari (Spaho) Applied Mathematics Department, Faculty of Natural Sciences, University of Tirana, (Albania) ABSTRACT Exports of goods represent

More information

Applying 2 k Factorial Design to assess the performance of ANN and SVM Methods for Forecasting Stationary and Non-stationary Time Series

Applying 2 k Factorial Design to assess the performance of ANN and SVM Methods for Forecasting Stationary and Non-stationary Time Series Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 22 (2013 ) 60 69 17 th International Conference in Knowledge Based and Intelligent Information and Engineering Systems

More information

Gasoline Consumption Analysis

Gasoline Consumption Analysis Gasoline Consumption Analysis One of the most basic topics in economics is the supply/demand curve. Simply put, the supply offered for sale of a commodity is directly related to its price, while the demand

More information

Soybean Price Forecasting in Indian Commodity Market: An Econometric Model

Soybean Price Forecasting in Indian Commodity Market: An Econometric Model Volume 3, Issue 1 June 2014 58 RESEARCH ARTICLE ISSN: 2278-5213 Soybean Price Forecasting in Indian Commodity Market: An Econometric Model Rajesh Panda Symbiosis Institute of Business Management, Bengaluru

More information

Forecasting Major Food Crops Production in Khyber Pakhtunkhwa, Pakistan

Forecasting Major Food Crops Production in Khyber Pakhtunkhwa, Pakistan Journal of Applied and Advanced Research 2017, 2(1): 21 30 doi.: 10.21839/jaar.2017.v2i1.40 http://www.phoenixpub.org/journals/index.php/jaar ISSN 2519-9412 / 2017 Phoenix Research Publishers Research

More information

PREDICTING THE EVOLUTION OF BET INDEX, USING AN ARIMA MODEL. KEYWORDS: ARIMA, BET, prediction, moving average, autoregressive

PREDICTING THE EVOLUTION OF BET INDEX, USING AN ARIMA MODEL. KEYWORDS: ARIMA, BET, prediction, moving average, autoregressive PREDICTING THE EVOLUTION OF BET INDEX, USING AN ARIMA MODEL Florin Dan Pieleanu 1* ABSTRACT Trying to predict the future price of certain stocks, securities or indexes is quite a common goal, being motivated

More information

Econometría 2: Análisis de series de Tiempo

Econometría 2: Análisis de series de Tiempo Econometría 2: Análisis de series de Tiempo Karoll GOMEZ kgomezp@unal.edu.co http://karollgomez.wordpress.com Primer semestre 2016 I. Introduction Content: 1. General overview 2. Times-Series vs Cross-section

More information

Methods and Applications of Statistics in Business, Finance, and Management Science

Methods and Applications of Statistics in Business, Finance, and Management Science Methods and Applications of Statistics in Business, Finance, and Management Science N. Balakrishnan McMaster University Department ofstatistics Hamilton, Ontario, Canada 4 WILEY A JOHN WILEY & SONS, INC.,

More information

A THRESHOLD COINTEGRATION ANALYSIS OF ASYMMETRIC ADJUSTMENTS IN THE GHANAIAN MAIZE MARKETS. Henry de-graft Acquah, Senior Lecturer

A THRESHOLD COINTEGRATION ANALYSIS OF ASYMMETRIC ADJUSTMENTS IN THE GHANAIAN MAIZE MARKETS. Henry de-graft Acquah, Senior Lecturer A THRESHOLD COINTEGRATION ANALYSIS OF ASYMMETRIC ADJUSTMENTS IN THE GHANAIAN MAIZE MARKETS ABSTRACT Henry de-graft Acquah, Senior Lecturer University of Cape Coast, Cape Coast, Ghana Phone: +00233245543956,

More information

Multi-Level µtesla: A Broadcast Authentication System for Distributed Sensor Networks

Multi-Level µtesla: A Broadcast Authentication System for Distributed Sensor Networks Multi-Level µtesla: A Broadcast Authentication System for Distributed Sensor Networks Donggang Liu Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh,

More information

ScienceDirect. Guidelines for Applying Statistical Quality Control Method to Monitor Autocorrelated Prcoesses

ScienceDirect. Guidelines for Applying Statistical Quality Control Method to Monitor Autocorrelated Prcoesses Available online at www.sciencedirect.com ScienceDirect Procedia Engineering 69 ( 2014 ) 1449 1458 24th DAAAM International Symposium on Intelligent Manufacturing and Automation, 2013 Guidelines for Applying

More information

Volume-5, Issue-1, June-2018 ISSN No:

Volume-5, Issue-1, June-2018 ISSN No: FORECASTING EXCHANGE RATE WITH AR(1) AND MA(1) Armi Bakar Lecture at Universitas Indraprasta PGRI, Jakarta, indonesia Abstract In this study has a major problem with the B & J methodology, the problem

More information

OPTIMIZATION AND OPERATIONS RESEARCH Vol. IV - Inventory Models - Waldmann K.-H

OPTIMIZATION AND OPERATIONS RESEARCH Vol. IV - Inventory Models - Waldmann K.-H INVENTORY MODELS Waldmann K.-H. Universität Karlsruhe, Germany Keywords: inventory control, periodic review, continuous review, economic order quantity, (s, S) policy, multi-level inventory systems, Markov

More information

Better ACF and PACF plots, but no optimal linear prediction

Better ACF and PACF plots, but no optimal linear prediction Electronic Journal of Statistics Vol. 0 (0000) ISSN: 1935-7524 DOI: 10.1214/154957804100000000 Better ACF and PACF plots, but no optimal linear prediction Rob J Hyndman Department of Econometrics & Business

More information

Business Analytics & Data Mining Modeling Using R Dr. Gaurav Dixit Department of Management Studies Indian Institute of Technology, Roorkee

Business Analytics & Data Mining Modeling Using R Dr. Gaurav Dixit Department of Management Studies Indian Institute of Technology, Roorkee Business Analytics & Data Mining Modeling Using R Dr. Gaurav Dixit Department of Management Studies Indian Institute of Technology, Roorkee Lecture - 02 Data Mining Process Welcome to the lecture 2 of

More information

DEPARTMENT OF QUANTITATIVE METHODS & INFORMATION SYSTEMS

DEPARTMENT OF QUANTITATIVE METHODS & INFORMATION SYSTEMS DEPARTMENT OF QUANTITATIVE METHODS & INFORMATION SYSTEMS Time Series and Their Components QMIS 320 Chapter 5 Fall 2010 Dr. Mohammad Zainal 2 Time series are often recorded at fixed time intervals. For

More information

Spreadsheets in Education (ejsie)

Spreadsheets in Education (ejsie) Spreadsheets in Education (ejsie) Volume 2, Issue 2 2005 Article 5 Forecasting with Excel: Suggestions for Managers Scott Nadler John F. Kros East Carolina University, nadlers@mail.ecu.edu East Carolina

More information

STATISTICAL TECHNIQUES. Data Analysis and Modelling

STATISTICAL TECHNIQUES. Data Analysis and Modelling STATISTICAL TECHNIQUES Data Analysis and Modelling DATA ANALYSIS & MODELLING Data collection and presentation Many of us probably some of the methods involved in collecting raw data. Once the data has

More information

MATLAB Seminar for South African Reserve Bank

MATLAB Seminar for South African Reserve Bank MATLAB Seminar for South African Reserve Bank Nicole Beevers Application Engineer nicole.beevers@mathworks.com 2017 The MathWorks, Inc. 1 Agenda Introduction: Welcome from Opti-Num Solutions (15 mins)

More information

Testing for Seasonal Integration and Cointegration: The Austrian Consumption Income Relationship LIYAN HAN GERHARD THURY. Shima Goudarzi June 2010

Testing for Seasonal Integration and Cointegration: The Austrian Consumption Income Relationship LIYAN HAN GERHARD THURY. Shima Goudarzi June 2010 Testing for Seasonal Integration and Cointegration: The Austrian Consumption Income Relationship LIYAN HAN GERHARD THURY Shima Goudarzi June 2010 Table of content -Introduction -Univariate tests of the

More information

Copvriqht All Riqhts Reseved.

Copvriqht All Riqhts Reseved. Copvriqht 001. All Riqhts Reseved. THE USEFULNESS OF INDICES OF CONSUMER SENTIMENT IN PREDICTING EXPENDITURES Robert P. Leone, University of Texas at Austin Wagner A. Kamakura, SUNY-Buffalo Abstract Surveys

More information

ADVANCED ECONOMETRICS (EC312)

ADVANCED ECONOMETRICS (EC312) ADVANCED ECONOMETRICS (EC312) Course duration: 54 hours lecture and class time (Over three weeks) LSE Teaching Department: Department of Economics Lead Faculty: Dr Marcia Schafgans and Dr Tatiana Komarova

More information

C. Wohlin, P. Runeson and A. Wesslén, "Software Reliability Estimations through Usage Analysis of Software Specifications and Designs", International

C. Wohlin, P. Runeson and A. Wesslén, Software Reliability Estimations through Usage Analysis of Software Specifications and Designs, International C. Wohlin, P. Runeson and A. Wesslén, "Software Reliability Estimations through Usage Analysis of Software Specifications and Designs", International Journal of Reliability, Quality and Safety Engineering,

More information

Time Series Analysis in the Social Sciences

Time Series Analysis in the Social Sciences one Time Series Analysis in the Social Sciences in the social sciences, data are usually collected across space, that is, across countries, cities, and so on. Sometimes, however, data are collected across

More information

Yt i = " 1 + " 2 D 2 + " 3 D 3 + " 4 D 4 + $ 1 t 1. + $ 2 (D 2 t 2 ) + $ 3 (D 3 t 3 ) + $ 4 (D 4 t 4 ) + :t i

Yt i =  1 +  2 D 2 +  3 D 3 +  4 D 4 + $ 1 t 1. + $ 2 (D 2 t 2 ) + $ 3 (D 3 t 3 ) + $ 4 (D 4 t 4 ) + :t i Real Price Trends and Seasonal Behavior of Louisiana Quarterly Pine Sawtimber Stumpage Prices: Implications for Maximizing Return on Forestry Investment by Donald L. Deckard Abstract This study identifies

More information

The retailer is the final frontier of

The retailer is the final frontier of Demand planning and Forecasting with Pos Data: A Case Study By Fred Andres The retailer is the final frontier of supply chain planning. So, it is important for manufacturers to have a serious look at what

More information

Choosing the Right Type of Forecasting Model: Introduction Statistics, Econometrics, and Forecasting Concept of Forecast Accuracy: Compared to What?

Choosing the Right Type of Forecasting Model: Introduction Statistics, Econometrics, and Forecasting Concept of Forecast Accuracy: Compared to What? Choosing the Right Type of Forecasting Model: Statistics, Econometrics, and Forecasting Concept of Forecast Accuracy: Compared to What? Structural Shifts in Parameters Model Misspecification Missing, Smoothed,

More information

Measuring long-term effects in marketing P.M Cain

Measuring long-term effects in marketing P.M Cain Measuring long-term effects in marketing P.M Cain Conventional marketing mix models are typically used to measure short-term marketing ROI and guide optimal budget allocation. However, this is only part

More information

ENTRUST CERTIFICATE SERVICES

ENTRUST CERTIFICATE SERVICES ENTRUST CERTIFICATE SERVICES Certification Practice Statement Version: 2.14 March 7, 2016 2016 Entrust Limited. All rights reserved. Revision History Issue Date Changes in this Revision 1.0 May 26, 1999

More information

Linear model to forecast sales from past data of Rossmann drug Store

Linear model to forecast sales from past data of Rossmann drug Store Abstract Linear model to forecast sales from past data of Rossmann drug Store Group id: G3 Recent years, the explosive growth in data results in the need to develop new tools to process data into knowledge

More information

Can Cascades be Predicted?

Can Cascades be Predicted? Can Cascades be Predicted? Rediet Abebe and Thibaut Horel September 22, 2014 1 Introduction In this presentation, we discuss the paper Can Cascades be Predicted? by Cheng, Adamic, Dow, Kleinberg, and Leskovec,

More information

Leveraging Smart Meter Data & Expanding Services BY ELLEN FRANCONI, PH.D., BEMP, MEMBER ASHRAE; DAVID JUMP, PH.D., P.E.

Leveraging Smart Meter Data & Expanding Services BY ELLEN FRANCONI, PH.D., BEMP, MEMBER ASHRAE; DAVID JUMP, PH.D., P.E. ASHRAE www.ashrae.org. Used with permission from ASHRAE Journal. This article may not be copied nor distributed in either paper or digital form without ASHRAE s permission. For more information about ASHRAE,

More information

USING A LARGE RESERVOIR MODEL IN THE PROBABILISTIC ASSESSMENT OF FIELD MANAGEMENT STRATEGIES

USING A LARGE RESERVOIR MODEL IN THE PROBABILISTIC ASSESSMENT OF FIELD MANAGEMENT STRATEGIES PROCEEDINGS, Twenty-Seventh Workshop on Geothermal Reservoir Engineering Stanford University, Stanford, California, January 28-30, 2002 SGP-TR-171 USING A LARGE RESERVOIR MODEL IN THE PROBABILISTIC ASSESSMENT

More information

DRAFT NON-BINDING BEST PRACTICES EXAMPLES TO ILLUSTRATE THE APPLICATION OF SAMPLING GUIDELINES. A. Purpose of the document

DRAFT NON-BINDING BEST PRACTICES EXAMPLES TO ILLUSTRATE THE APPLICATION OF SAMPLING GUIDELINES. A. Purpose of the document Page 1 DRAFT NON-BINDING BEST PRACTICES EXAMPLES TO ILLUSTRATE THE APPLICATION OF SAMPLING GUIDELINES A. Purpose of the document 1. The purpose of the non-binding best practice examples for sampling and

More information

FORECAST MODEL USING ARIMA FOR STOCK PRICES OF AUTOMOBILE SECTOR. Aloysius Edward. 1, JyothiManoj. 2

FORECAST MODEL USING ARIMA FOR STOCK PRICES OF AUTOMOBILE SECTOR. Aloysius Edward. 1, JyothiManoj. 2 FORECAST MODEL USING ARIMA FOR STOCK PRICES OF AUTOMOBILE SECTOR Aloysius Edward. 1, JyothiManoj. 2 Faculty, Kristu Jayanti College, Autonomous, Bengaluru. Abstract There has been a growing interest in

More information

An Automated Approach for Recommending When to Stop Performance Tests

An Automated Approach for Recommending When to Stop Performance Tests An Automated Approach for Recommending When to Stop Performance Tests Hammam M. AlGhmadi, Mark D. Syer, Weiyi Shang, Ahmed E. Hassan Software Analysis and Intelligence Lab (SAIL), Queen s University, Canada

More information

8. Consumption, uncertainty, and the current account

8. Consumption, uncertainty, and the current account 8. Consumption, uncertainty, and the current account Index: 8. Consumption, uncertainty, and the current account... 8. Introduction... 8. The deterministic case...3 8.3 Optimal consumption under uncertainty...4

More information

Getting Started with HLM 5. For Windows

Getting Started with HLM 5. For Windows For Windows Updated: August 2012 Table of Contents Section 1: Overview... 3 1.1 About this Document... 3 1.2 Introduction to HLM... 3 1.3 Accessing HLM... 3 1.4 Getting Help with HLM... 3 Section 2: Accessing

More information

An Approach to Predicting Passenger Operation Performance from Commuter System Performance

An Approach to Predicting Passenger Operation Performance from Commuter System Performance An Approach to Predicting Passenger Operation Performance from Commuter System Performance Bo Chang, Ph. D SYSTRA New York, NY ABSTRACT In passenger operation, one often is concerned with on-time performance.

More information

ENTRUST CERTIFICATE SERVICES

ENTRUST CERTIFICATE SERVICES ENTRUST CERTIFICATE SERVICES Certification Practice Statement for Extended Validation (EV) SSL Certificates Version: 1.02 August 1, 2007 2007 Entrust Limited. All rights reserved. Revision History Issue

More information

Electricity consumption, Peak load and GDP in Saudi Arabia: A time series analysis

Electricity consumption, Peak load and GDP in Saudi Arabia: A time series analysis 22nd International Congress on Modelling and Simulation, Hobart, Tasmania, Australia, 3 to 8 December 2017 mssanz.org.au/modsim2017 Electricity consumption, Peak load and GDP in Saudi Arabia: A time series

More information

Towards an ISO-9000 compliant Certification Service Provider

Towards an ISO-9000 compliant Certification Service Provider Towards an ISO-9000 compliant Certification Service Provider D. Lekkas, S. Gritzalis, S. Katsikas Abstract-- In this paper we present a complete reference framework for the operation of Certification Service

More information

EURO-INDICATORS WORKING GROUP FLASH ESTIMATES 6 TH MEETING JULY 2002 EUROSTAT A6 DOC 105/02

EURO-INDICATORS WORKING GROUP FLASH ESTIMATES 6 TH MEETING JULY 2002 EUROSTAT A6 DOC 105/02 EURO-INDICATORS WORKING GROUP 6 TH MEETING 11-12 JULY 2002 EUROSTAT A6 DOC 105/02 FLASH ESTIMATES ITEM II-10 ON THE AGENDA OF THE MEETING OF THE WORKING GROUP ON EURO-INDICATORS Summary of Employment Nowcasting:

More information

The prediction of electric energy consumption using an artificial neural network

The prediction of electric energy consumption using an artificial neural network Energy Production and Management in the 21st Century, Vol. 1 109 The prediction of electric energy consumption using an artificial neural network I. Chernykh 1, D. Chechushkov 1 & T. Panikovskaya 2 1 Department

More information

THE ROLE OF NESTED DATA ON GDP FORECASTING ACCURACY USING FACTOR MODELS *

THE ROLE OF NESTED DATA ON GDP FORECASTING ACCURACY USING FACTOR MODELS * Andrejs Bessonovs University of Latvia, Latvia THE ROLE OF NESTED DATA ON GDP FORECASTING ACCURACY USING FACTOR MODELS * Abstract The paper studies an impact of nested macroeconomic data on Latvian GDP

More information

Testing the long-run relationship between health expenditures and GDP in the presence of structural change: the case of Spain

Testing the long-run relationship between health expenditures and GDP in the presence of structural change: the case of Spain Applied Economics Letters, 2007, 14, 271 276 Testing the long-run relationship between health expenditures and GDP in the presence of structural change: the case of Spain Vicente Esteve* and Jose L. Martı

More information

INTRODUCTION BACKGROUND. Paper

INTRODUCTION BACKGROUND. Paper Paper 354-2008 Small Improvements Causing Substantial Savings - Forecasting Intermittent Demand Data Using SAS Forecast Server Michael Leonard, Bruce Elsheimer, Meredith John, Udo Sglavo SAS Institute

More information

Semester 2, 2015/2016

Semester 2, 2015/2016 ECN 3202 APPLIED ECONOMETRICS 3. MULTIPLE REGRESSION B Mr. Sydney Armstrong Lecturer 1 The University of Guyana 1 Semester 2, 2015/2016 MODEL SPECIFICATION What happens if we omit a relevant variable?

More information

If you make a mistake, press Stop and re- try.

If you make a mistake, press Stop and re- try. Market Vector Auto Regression app for iphone Version 1.0 This app models the (close- open) price direction (today's price travel) of a given target stock, as a function of prior days opening and closing

More information

Time Series Models for Business and Economic Forecasting

Time Series Models for Business and Economic Forecasting Time Series Models for Business and Economic Forecasting With a new author team contributing decades of practical experience, this fully updated and thoroughly classroom-tested second edition textbook

More information